Method and apparatus for digital encryption
First Claim
Patent Images
1. A cryptographic communications system comprising:
- (a) a communications channel;
(b) an encoding means coupled to said channel and adapted for transforming a transmitted plaintext signal, b, to a ciphertext signal, c, and for transmitting c on said channel, said cryptographic communications system using at least a first key, J, having n bits and a second key, K, having n*(n-1)/2 bits, the bits of the K key being divided among n-1 K(i) keys, where i is a number which goes from 1 to n-1, and each K(i) key has i bits, and where J and K are used, in connection with the plaintext signal, b, to create a scramble of the original plaintext signal in accordance with the formula;
space="preserve" listing-type="equation">cb(i)=b(i)XOR(Boolean(cb.sub.(0→
i-1) ≧
K(i))XOR J(i), where cb(i) is the output cipherbit, b(i) is the input plaintext bit, J(i) is a bit from a first encryption key, K(i) is a binary number comprised of i bits from said second encryption key, and the expression Boolean(cb.sub.(0→
i-1) ≧
K(i)) is 1 if the value of the preceding cipherbits, expressed as a single number is greater than or equal to the value of K(i), and the expression Boolean(cb.sub.(0→
i-1) ≧
K(i)) is 0 if the value of the preceding cipherbits, expressed as a single number is less than the value of K(i).
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a real time digital encryption system which may be implemented in either hardware or software. The encryption system uses keys and an algorithm in which the encryption is determined in part by the data being encrypted, to obtain a scramble which is uniquely determined by the combination of the encryption keys and the data being encrypted, thereby making any effort at cryptanalysis extremely difficult, if not impossible. Consequently, anyone seeking to decrypt the data encrypted by the present invention would have to resort to an extensive brute force approach to such decryption efforts.
91 Citations
13 Claims
-
1. A cryptographic communications system comprising:
-
(a) a communications channel; (b) an encoding means coupled to said channel and adapted for transforming a transmitted plaintext signal, b, to a ciphertext signal, c, and for transmitting c on said channel, said cryptographic communications system using at least a first key, J, having n bits and a second key, K, having n*(n-1)/2 bits, the bits of the K key being divided among n-1 K(i) keys, where i is a number which goes from 1 to n-1, and each K(i) key has i bits, and where J and K are used, in connection with the plaintext signal, b, to create a scramble of the original plaintext signal in accordance with the formula;
space="preserve" listing-type="equation">cb(i)=b(i)XOR(Boolean(cb.sub.(0→
i-1) ≧
K(i))XOR J(i),where cb(i) is the output cipherbit, b(i) is the input plaintext bit, J(i) is a bit from a first encryption key, K(i) is a binary number comprised of i bits from said second encryption key, and the expression Boolean(cb.sub.(0→
i-1) ≧
K(i)) is 1 if the value of the preceding cipherbits, expressed as a single number is greater than or equal to the value of K(i), and the expression Boolean(cb.sub.(0→
i-1) ≧
K(i)) is 0 if the value of the preceding cipherbits, expressed as a single number is less than the value of K(i). - View Dependent Claims (2)
-
-
3. A cryptographic communications system comprising:
-
(a) a communications channel; (b) at least one encoding means adapted for transforming an input signal, b, to a ciphertext signal, c, each encoding means of said cryptographic communications system using at least a first key, J, having n bits and a second key, K, having n*(n-1)/2 bits, the bits of the K key being divided among n-1K(i) subkeys, where i is a number which goes from 1 to n-1, and each K(i) subkey has i bits, and where J and K are used, in connection with the input signal, b, to create a scramble of the original input signal in accordance with the formula;
space="preserve" listing-type="equation">cb(i)=b(i)XOR(Boolean(cb.sub.(0→
i-1) ≧
K(i))XOR J(i),where cb(i) is the output cipherbit, b(i) is the input bit, J(i) is a bit from a first encryption key, K(i) is a binary number comprised of i bits from said second encryption key, and the expression Boolean(cb(0→
i-1) ≧
K(i)) is 1 if the value of the preceding cipherbits, expressed as a single number is greater than or equal to the value of K(i), and the expression Boolean(cb.sub.(0→
i-1) ≧
K(i)) is 0 if the value of the preceding cipherbits, expressed as a single number is less than the value of K(i);(c) means for receiving the output, c, of an encoding means, said means for receiving having an output which goes to a device selected from the group consisting of (i) an additional encoding means, and (ii) said communications channel, whereby the output of each encoding means will become either the input of a subsequent encoding means, or the output onto said communications channel. - View Dependent Claims (4, 5, 6, 7, 8)
-
-
9. A method for establishing cryptographic communications comprising the steps of:
-
(a) Selecting a first key, J, said first key capable of being expressed by n bits; (b) Selecting a second key, K, having n*(n-1)/2 bits, said K key being comprised of n-1 K(i) subkeys, where i is a number which goes from 1 to n-1, and each K(i) subkey has i bits; (c) Taking a plaintext message, b, and obtaining a ciphertext, cb, by repeatedly performing the following steps thereon; (i) Breaking said plaintext message, b, into blocks, each block having no more than n bits; (ii) Performing the bitwise operation;
space="preserve" listing-type="equation">cb(i)=b(i)XOR(Boolean(cb.sub.(0→
i-1) ≧
K(i))XOR J(i),whereby, the ciphertext message cb(i) will be created in a bitwise manner. - View Dependent Claims (10, 11, 12, 13)
-
Specification